Multiple Choice
What application of encryption verifies that a document was sent by the person it says it is from?
A) Digital rights management
B) Asymmetric encryption
C) Cryptographic hash
D) Digital signatures
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q39: Keeping a copy of the encryption key
Q40: A _ is when a hash algorithm
Q41: A(n)_ is a step-by-step,recursive computational procedure for
Q42: A corporate spy copies proprietary information into
Q43: Cryptographic algorithms are used for all of
Q44: An attacker is able to decrypt a
Q45: Keyspace refers to<br>A)The location where keys are
Q46: Hashing algorithms can be compromised<br>A)By a collision
Q47: The ROT13 cipher is an example of
Q48: The strength of a symmetric encryption is